Home | Issues | Profile | History | Submission | Review
Vol: 4(4) No: 1 / March 1994      

Security Issues in Distributed Computing Systems
Sergiu Dascalu
Politehnica University of Bucharest, Faculty of Control and Computers, Sp. Independentei 313,Bucharest, Romania
Arun R. Sathnur
School of Computer Science, Tehnical University of Nova Scotia, P. O. Box 1000,Halifax, Nova Scotia, B3J 2X4, Canada


Keywords: computer security, distributed computing

Abstract
The aim of this paper is to provide an overview of the most important security aspects of the computing systems and to examine some recent solutions designated to ensure computer security. Emphasis is given to the increasingly expanding distributed systems and in this respect, new approaches of the security problems brought by the development of modern computing systems such as networks, wireless LANs, multimedia systems and electronics identification systems are discussed. Several new proposed security tools and techniques are also surveyed.

References
[1] B. Menkus, Introduction to Computer Security, Computers & Security, 11 (2) (1992) 121-127.
[2] B. Menkus, Concerns in Computer Security, Computers & Security, 11 (3) (1992) 211-216
[3] B. P. Zajac, Computer Vizal Risks-How Rad is the Threat TComputers & Security, 11 (8) (1992) 29-34.
[4] R. H. Baker, Computer Security Handaaok, (TAB books, Mc Graw-Hill, 1990)
[5] R. L. Sherman, Distributed Systems Security, Computers & Security, 11 (1) (1992) 24-28
[6] J. P. Kruys, Progress in Secure Distributed Systems, Computers & Security, 10 (5) (1991) 429-441
[7] G. Black , Update on Open Syste ms Security, Computers & Security, 11 (8) (1992) 699-702.
[8] S. Donovan, Security of PCs in a Distributed Enviroment, Computers & Security, 12 (12) (1993) 28-31.
[9] M. Singal and N. G. Shivantri, Advanced Concepts in Operating Systems, (Mc Graw-Hill,1994).
[10] T. Y. Woo and S. S. Lum, Authentication for distributed Systems, IEEE Computer, 25 (1) (1992) 39-52.
[11] A. Liebl, Authentication in Distributed Systems: A Bibliography, Operating Systems Review ACM Press, 27 (4) (1993) 31-41.
[12] D.P. Sidhu, Authentication Protocols for Computer Networks, Computers Networks and ISDN Systems, 15 (11) (1986) 297-310
[13] D. Russell, High Level Arhitecture and the Kerberos System, Computer Networks and ISDN Systems, 19 (3) (1990) 201-214.
[14] P. A. Karger, Authentication and Discretionary Access Control in Computer Networks, Computer Networks, 10 (1) (1985) 26-33.
[15] D. Gollman, T. Bethand F. Damm, Authentication Services in Distributed Systems, Computer and Security, 12 (8) (1993) 753-764.
[16] C. Kaufman, DASS-Distributed Authentication Security Service, Internet draft, ftp site nic.nordu.net, 1991).
[17] C. Zimmermann, Making Distributed Multimedia Systems Secure: The Switch board Approach, Operating Systems Review, ACM Press, 28 (1) (1994) 88-99.
[18] D. L. Lathrop, Security Aspects of Wireless Local Areea Networks, Computers & Security, 11 (11) (1992) 421-426.
[19] G. I. Davida and Y. G. Desmedt, Passports, and Visas versus IDs, Computers & Security, 11 (3) (1992) 253-258
[20] F. B. Cohen Operating Systems Protection Through Program Evolution, Computers & Security, 12 (12) (1993) 565-584
[21] T. F. Lunt, A Survey of Intrusion Delection Techniquers, Computers & Security, 12 (12) (1993) 405-418.
[22] E. H. Spafford, OPUS: Preventing Weak Password Choices, Computers & Security, 11 (111) (1992) 273-278.
[23] V. Varadharajan and S. Black, Multilevel Security in a Distributed Object-Oriented Systems Computers & Security, 10 (10 (1991) 51-67.
[25] M. R. Low, and B. Christianson, Fine Grained Object Protection in UNIX, Operating Systems Review, ACM Press, 27 (1) (1993) 33-50.
[26] G.F.G. O´Shea, Operating System Imtegrity, Computers & Security,m 10 (5) (1991) 443-452.
[27] S. von Solms and D. Naccache, On Blind Signatures and Perfect Crimes, Computers & Security, 11 (6) (1992) 581-583.
[28] G.F.G. O´Shea, Redundant Rights in Protection Systems, Operating Sistems Review, ACM Press, 26 (7) (1992) 27-30.